Wipro Industrial Risk Management

Introduction to…
Industrial and Critical
Infrastructure Cybersecurity
and Risks
Matt Bancroft
Industrial Risk Management Director
1
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Industrial Cybersecurity
•
•
•
•
Summary
Challenges & Benefits
Downstream Critical OT
Industrial Control Past &
present
• Industrial OT Environments
• Industrial Architectures &
SCADA
• Industrial Risk Management
Example Case Study
2
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Summary
Industrial Control Systems and
Information Technology have
now converged, have become
more complex and more
connected, bringing risks
There has been an explosion
in the use of Information
Technology in Industrial and
Critical Infrastructures
3
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Security Supporting Key Business KPI’s
SCOR METRICS
4
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Layers of Defence
Plant Safety
Security Defence in Depth
Wipro IRM
Policies, Procedures,
Awareness
Physical: Gates,
Walls, Locks
Perimeter: Firewalls
Network
Computers
and Devices
Apps &
Data
Risk Management based upon
a Layers Of Protection Analysis
(LOPA) as described in IEC
61511 part 3 Annex F.
5
Based upon Defence In Depth, a
layering tactic, conceived by the
National Security Agency (NSA) as a
comprehensive approach to
information and electronic security.
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Bespoke Industrial Security Risk
Management. Business Focussed,
Pragmatic, Risk Based, Defence in
Depth approach across all Industrial
cyber threat perimeters:
OT Cybersecurity Change Program Challenges
• Quantifying Risk to the Business
• Gaining investment in critical OT
• Building Collaboration and Trust and between IT
and OT teams
• Implementing security controls without
impacting 24/7/365 operations
• Changing Organisation and Accountability
• Changing the people’s behaviours
• Defining the scope of OT systems
• Improving Vendor Security Maturity and Support
6
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
?
?
?
?
Business Benefits Of Cybersecurity
• Foundations for Industry 4.0 innovation
• Manage risks to Business Operations
• Improve Production Continuity & KPI’s
• Speed up innovation programs
• Improve quality and efficiency
• Integration and Standardisation
• Compliance: Regulatory & Third Party JV
7
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Critical Downstream Operational Processes: Critical OT
Automation & Control Systems
Operational Process
Integrated Control & Safety Systems
Pump, compressor, Turbomachinery Control
Boiler Control and Burner Management Systems
Metering Systems
Electricity Power Control Systems
Power and Energy Management Systems
Process Control and Optimization Systems
Emission Monitoring Systems
Condition & Performance Monitoring Systems
Emergency Shutdown System (ESD)
Fire and Gas System (F&G)
Safe Guarding System (SGS)
High Integrity Pressure Protection System
Turbine Control and Protection
Gas Analyzer System
Tank Level System
Alarm Management System
Integrated Motor Control System
Anti-Surge Control System
Desalter
Furnace
Fractional Distillation
Vacuum Flashing
Coking
Solvent Extraction
Catalytic Cracking
Hydrocracking
Hydrotreating
Catalytic Reforming
Gas Plant
Alkylation Plant
Gasoline blending
Isomerization unit
Steam reforming
Sweetening Unit
Storage Tanks
Utilities - Cooling Tower, Boiler, Electrical SS
Wastewater collection and treating systems
|Furnace|
|Desalter|
|Alkylation Plant|
8
|Catalytic Reforming|
|Gasoline blending|
|Gas Plant|
|Coking|
|Isomerization unit|
|Solvent Extraction|
|Steam reforming|
|Catalytic Cracking|
|Sweetening Unit|
|Hydrocracking|
|Storage Tanks|
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
|Vacuum Flashing| |Wastewater collection and treating systems|
|Hydrotreating|
|Utilties|
|Fractional Distillation|
Summary: Critical Processes & Critical OT
9
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Industrial Control & Automation: The Past
•Unconnected to the Web
•Used proprietary
hardware and software
•Secure through obscurity
and isolation
10
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Industrial Control & Automation: Present
• Converged IT and Industrial
Control systems into Operational
Technology (OT)
• This introduces additional
Complexity
• IT and OT systems now Connect
and communicate with each
other.
11
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
SHODAN: You Are More Connected Than You Know
• The image shows the number of exposed
internet connected industrial control
systems such as SCADA, found on SHODAN
• Many of these system owners are not
aware of this connectivity or of the risks to
their business
• Many may connect through third parties or
through undocumented or uncontrolled
corporate connections
12
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
19th December 2014 | News
Steelworks site was directly targeted using a very
sophisticated spear phishing and social engineering
method. Gained access onto the office network of the
facility then moved into the production network
which resulted in “massive damage to machinery.”
This incident is significant as this is only the second
time a reliable source has publicly confirmed
physical damage to control systems as the result of a
cyber-attack.
13
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
OT IT Environments Overview
Internet
External/Remote/Internet
• Web and Cloud services
• Vendors and Support Partners
• Remote Access and Support
Enterprise Information Technology
• ERP, Email, VPN, Networks
Integration
• ERP to Plant integration systems
• MES/MOMS, SAP-PI, Networks
Operational Technology (OT)
• IT Supporting local production and processing
operations
• SCADA, Industrial Control Systems, HMI,
Automation, Networks, Process Control, PLC’s
14
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
OT IT Security Architectures
External
ISA99/IEC62443
15
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Example OT & Industrial Control System : SCADA
• SCADA System
• Supervisory Control And Data
Acquisition
• Historian/Database app
• Graphical GUI & Visual
Development app
• Windows/Unix PC’s & Servers
TCP/IP Network
• Which Controls…
• Programmable Logic Controllers
(PLC)
• Which Controls Physical
Systems…
• Instrumentation
• Sensors and actuators
• Valves
16
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
MES/MOMS – Manufacturing Execution System
MES requires connectivity between Enterprise and Operations
17
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Industrial Risk Management
Demonstrating the Value of Risk Reduction
18
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
What is the Risk To Our Business From OT?
What is the impact of an outage at our plants?
• Cost of one day production outages at each plant?
• Number of sites and production days?
How exposed are we to Cyber Threats?
• What are the threats? How exposed to these threats are we?
• How Converged, Complex and Connected are OT/IT environments?
How often could an outage happen?
• Every Day? Every year? Every ten years?
19
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Example Threat: Stuxnet & Advanced Targeted Attacks
A map showing infections
of the related malware
strains Stuxnet, Duqu,
Flame and Gauss
20
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Example Cybersecurity Risk Management Program
•
•
•
•
•
•
•
•
•
•
21
Global Chemical Co.
85 Sites – Upstream & Downstream
35 Countries
6 Months time constraint
Combination of Onsite and Self
Assessment
Qualitative and Quantitative Risk
Reports
Board Level Consultancy
Detailed Remediation & Ongoing
Governance Strategies
Low to High OT complexity range across
sites
Wide range of OT capabilities and
maturities
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Types of Systems Discovered
22
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
How Exposed to Cyber Threats Are We?
23
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
OT Cybersecurity Risk Management Business Case
What is the cost impact of an outage at our plants?
Average daily outages cost per plant
Number of Sites
Number of production Days
Cost of One Year Production Outage
$32,443 per site
70 sites
240 days
$545,035,211
How exposed or vulnerable are you to IT/OT Risks ?
Cyber Risk Assessment Exposure Factor
0.004 to 0.014 EF
How often could an outage happen?
Between once every year and every 10 years
1 to 0.1
Annualised Loss Expectancy is in the range
Cost of Industrial Risk Management Program
24
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
$218,014 to $7,630,492
$1,041,559
Case Study: Integrated IT OT Project in Oil and Gas
• A joint venture producer and distributer of Liquid Natural Gas (LNG) based in the middle
East operating a $6 Billion production and processing facility.
• Design and document a security
Information Security Management
system and operating model
• Deliver clear information security
organisation and governance and
provide transparency of risks.
• Appropriate model for both the office
and the plant environments and have
the flexibility to address the different
business priorities, challenges and
levels of risk in each.
• Prepare for ISO27001 certification
25
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Wipro Industrial Risk Management Practice
Service Catalogue
Profiles
•
•
•
•
•
•
•
•
•
•
•
Risk Assessment
Integrated Architecture & Infrastructure
Industrial CyberShield
iFAT Security Testing and Assurance
Industrial Threat Intelligence
Pilot Assurance Programs
Program Resourcing
IT OT Service Rationalisation
NERC CIP Compliance Assurance
Cybersecure Managed Services
Cybersecurity Strategy, Governance,
Frameworks
Alliances
26
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Principal Cybersecurity Consultant
• CISM, CISSP, CISA, CGEIT, GICSP
• 15 years exp. Manufacturing & supply chain
Quality, Risk & Compliance Consultant
• CISA, CISM, CRISC, IAPP, GAMP5, ISO 9001
• 12-20 years experience
Cybersecurity Engineer
• GICSP
• 10 years experience Engineering/Security
Questions?
27
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
28
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Industrial Cyber Shield - DPI2
The costs of running the latest secure versions of Operating Systems and
SCADA Software can be prohibitive to the business. Cyber Shield allows
secure operation of legacy systems whilst investing in the future.
• Pre-Patch Shield
– Make the patching process work to your business…not the
other way around
– Allows extended patching lifecycle
• SCADA Shield
– Securely run legacy SCADA software systems
– Extend system lifespan and investment
• OS Shield
– Protect Investments in legacy Operating Systems – Win XP
– Extend system lifespan and investment
• Cyber-Physical Shield
DPI2 – Deep Packet Industrial
Inspection
• SCADA and Industrial aware NextGen
Security Solutions
• Detailed service aware inspection of
SCADA and Industrial protocols; Modbus,
IEC 101/104, DNP-3, IEC61850
• Intra and inter ISA99 IEC 62443 security
zone applications
– Protect lives and manage physical Health and Safety risks
29
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
CybOps – Managed Cybersecurity Operations
 Centralised Cybersecurity Management for distributed OT/SCADA/ICS/IoT environments
 View your entire OT estate, assets and security compliance posture
 Control and monitor secure remote access
 Automate patching and AV processes to free up engineering resource
 NERC CIP Compliant inventory, logging and reporting
 Define and enforce central security policies
 Understand risks and make informed decisions
 Flexible, local, cloud and MSSP deployment options and pricing
Security Dashboard
30
Centralised Management
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Asset & Compliance Report
Cybersecurity: Physical Perimeter Services
This is your perimeter in the physical world, protecting you from
unauthorised intrusions, damage and theft using gates, walls, doors
locks and access control and intrusion technology solutions
 Spidernet USIMS - Unified Security Information
Management Systems

Physical threat monitoring and alerting
 Environmental Threat Assessments
31

Site access process

WAN/LAN cable single point of failure

Visitor and Third Party Access

Power failure

Data and Control room HVAC
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Case Study: Integrated IT OT Cyber Risk Management
Deliverables
Benefits
Cyber Risk review and management strategy for
UK Water Utility covering both IT and OT
Standardise and formalise cyber risk
management process, governance and
organisation across the business
IT
32
Raise awareness of risks to business from OT
Identify OT Systems, accountabilities and
potential impact on Critical Business Processes
Collaboration and alignment between IT and OT
teams
OT
© 2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL